Sciweavers

1010 search results - page 23 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
MSWIM
2005
ACM
15 years 5 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
95
Voted
WEBNET
2000
15 years 1 months ago
To Measure or not to measure: Why web usability is different from traditional usability
: Web usability is a common term used in discussions of WWW (World Wide Web). This is definitely important, as more and more web sites are frequently visited and have great impact ...
Charlotte Olsson
MOBICOM
2010
ACM
14 years 12 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
WCNC
2010
IEEE
15 years 3 months ago
A Comparison between Stand-Alone and Distributed Architectures for Spectrum Hole Detection
Abstract—In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architecture...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
EWSN
2006
Springer
15 years 11 months ago
Extending Network Lifetime Using an Automatically Tuned Energy-Aware MAC Protocol
Abstract. Sensor network devices have limited battery resources primarily consumed by radio communication. Network nodes play different communication roles and consequently consume...
Rebecca Braynard, Adam Silberstein, Carla Schlatte...